1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
ser-zykov [4K]
3 years ago
15

What is the biggest danger when you reveal information such as your Social Security number?

Computers and Technology
2 answers:
Dima020 [189]3 years ago
6 0

based off my knowledge im gonna to go with OPTION A because ur social security number holds information like your brith etc

Mars2501 [29]3 years ago
6 0
Umm I’m gonna say A also
You might be interested in
What type of malicious software tries to gather information about you without your consent?
AlekseyPX

Answer:

B-malware

Explanation:

I do tech and i help work on computars.

6 0
3 years ago
A domestic air carrier airplane lands at an intermediate airport at 1815Z. The latest time it may depart without a specific auth
serious [3.7K]

Answer:

A domestic air carrier airplane lands at an intermediate airport at 1815Z. The latest time it may depart without a specific authorization from an aircraft dispatcher is <u>1915Z (1 hour)</u>.

Explanation:

Under the domestic operations, an airplane landed on intermediate airport can remain their for not more than one hour so the time would me 1 hour.

Here the time represented by 1815Z and 1915Z is in Zulu Time Zone as depicted from letter "Z". The first two digits represent the hour (0-24) and the next two represent the minutes (0-59).

  • Here the landing time is 6:15 pm while departing time is after one hour that is 7:15 pm (1915Z).

i hope it will help you.

6 0
3 years ago
Divide the difference of 47 and 23 by the difference of 25 &amp;13​
OleMash [197]

Answer:

The answer is 2

Explanation:

3 0
3 years ago
A troubleshooting strategy that removes components from a system in order to get back to a basic configuration is called module
Semmy [17]

Answer:

B. False.

Explanation:

Troubleshooting strategy is a technique used to discover the cause of defeat in a system. The technician must learn to improvise with these strategies to solve a system problems.

Module replacement is a type of troubleshooting strategy that replaces a component with unknown status with another component with good status to determine the cause of the problem.

Removing a component from a system to get back to its basic configuration helps to eliminate factors that may make a computer problem difficult to solve.

3 0
3 years ago
You must configure an ip address on a catalyst 2950 xl switch using the default management switch port. from global configuratio
BlackZzzverrR [31]
Int vlan 1ip address 192.168.10.2 255.255.255.0
Is the command that definitely would you enter to configure the correct management port. So we must configure the IP address on a catalyst 2950xl switch using the default management switch port from the global configuration mode. The answer in this question is int vlan 1ip address 192.168.10.2 255.255.255.0 

7 0
3 years ago
Other questions:
  • It is important that data being imported from a text file into access are separated by a character, such as a comma, which defin
    8·1 answer
  • When changing the formatting of a spreadsheet to make it more readable, you should use light blue text on a bright blue backgrou
    12·1 answer
  • How many mustangs are built every day
    13·2 answers
  • The instant pivot button is displayed in the statistics and visualization tabs when a _______ search is run.
    15·1 answer
  • jason works for a restaurant that serves only organic local produced what trend is this business following?
    6·2 answers
  • (70 points) This is a legit question that I have for a device FOR my homework.
    5·2 answers
  • The World Wide Web is full of unstructured data. Search engines like Google, Bing and Yahoo have been doing a good job of allowi
    6·1 answer
  • Now let's create a memo. The memo should include all parts of a memo, and these parts should appear in the correct order. In you
    9·1 answer
  • Compare and contrast CD and DVD?
    10·2 answers
  • What type of code do computers typically use to operate? A. CSS B. HTML 5 C. HTML D. Binary
    12·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!